Bluetooth Security Attacks

Comparative Analysis, Attacks, and Countermeasures

  • Keijo Haataja
  • Konstantin Hyppönen
  • Sanna Pasanen
  • Pekka Toivanen

Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Table of contents

  1. Front Matter
    Pages i-vii
  2. Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
    Pages 1-2
  3. Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
    Pages 3-13
  4. Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
    Pages 15-22
  5. Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
    Pages 23-60
  6. Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
    Pages 61-70
  7. Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
    Pages 71-81
  8. Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
    Pages 83-84
  9. Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
    Pages 85-88
  10. Back Matter
    Pages 89-93

About this book

Introduction

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions.

The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

Keywords

Advanced Encryption Standard (AES) Bluetooth Man-in-the-middle attack Out-of-band channel Secure and fast encryption routine (SAFER+) Secure simple pairing Wireless security

Authors and affiliations

  • Keijo Haataja
    • 1
  • Konstantin Hyppönen
    • 2
  • Sanna Pasanen
    • 3
  • Pekka Toivanen
    • 4
  1. 1.School of ComputingUniversity of Eastern FinlandKuopioFinland
  2. 2.School of ComputingUniversity of Eastern FinlandKuopioFinland
  3. 3.School of ComputingUniversity of Eastern FinlandKuopioFinland
  4. 4.School of ComputingUniversity of Eastern FinlandKuopioFinland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-40646-1
  • Copyright Information The Author(s) 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-40645-4
  • Online ISBN 978-3-642-40646-1
  • Series Print ISSN 2191-5768
  • Series Online ISSN 2191-5776
  • About this book
Industry Sectors
Electronics
Telecommunications
Aerospace
Pharma